{"id":5467,"date":"2021-01-19T14:01:20","date_gmt":"2021-01-19T09:01:20","guid":{"rendered":"https:\/\/gfi-software.uz\/bez-kategorii\/gfi-endpointsecurity\/"},"modified":"2026-04-12T10:51:07","modified_gmt":"2026-04-12T05:51:07","slug":"gfi-endpointsecurity","status":"publish","type":"post","link":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/","title":{"rendered":"GFI EndPointSecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"5467\" class=\"elementor elementor-5467\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1d8e8326 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1d8e8326\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-65b335a2\" data-id=\"65b335a2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f1a12ae elementor-widget elementor-widget-text-editor\" data-id=\"2f1a12ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4 style=\"text-align: center;\">Tashqi xotira qurilmalari orqali ma&#8217;lumotlarning oqib ketishidan himoya qilish: USB flesh-disklar, tashqi HDDlar, tarmoq kartalari, kameralar, smartfonlar. Kompyuterni korporativ tarmoqqa ulamasdan ham ishlaydi.<\/h4><h2>Portativ qurilmalar yordamida tarmog&#8217;ingizni ma&#8217;lumotlar sizib chiqishidan himoya qiling<\/h2><p>GFI EndPointSecurity ma&#8217;lumotlar sizib chiqishi xavfini kamaytiradi<\/p><p>&#8211; Ma&#8217;lumotlarning sizib chiqishi xavfini baholash<\/p><p>&#8211; Ma&#8217;lumotlarni baholash<\/p><p>&#8211; Kirish nazorati<\/p><table border=\"1\"><tbody><tr><td><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/1-6.jpg\" sizes=\"(max-width: 371px) 100vw, 371px\" srcset=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/1-6.jpg 371w, https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/1-6-300x199.jpg 300w\" alt=\"\u0417\u0430\u0449\u0438\u0442\u0430 \u043e\u0442 \u0443\u0442\u0435\u0447\u043a\u0438 \u0434\u0430\u043d\u043d\u044b\u0445\" width=\"371\" height=\"246\" data-ll-status=\"loaded\" \/><\/td><td><h2>Ma&#8217;lumotlar oqishidan himoya qilish<\/h2><p>Xodimlar shaxsiy flesh-disklari va tashqi qattiq disklarini olib kelib, ularni tarmog&#8217;ingizda ishlatganda, bu ma&#8217;lumotlarning buzilishi xavfini sezilarli darajada oshiradi. GFI EndPointSecurity tarmoqdagi qurilmalarni tahlil qiladi va barcha kompyuterlar bo\u02bbylab ma\u02bclumotlarning sizib chiqishi xavfi darajasini ko\u02bbrsatuvchi to\u02bbliq ma\u02bclumotni namoyish etadi, xavfsizlikni yaxshilash bo\u02bbyicha maslahatlar beradi va xodimlarning tashqi qurilmalarga kirishini nazorat qiladi.<\/p><\/td><\/tr><tr><td><h2>Oddiy kirishni boshqarish<\/h2><p>GFI EndPointSecurity tarmog&#8217;ingizda qaysi foydalanuvchilar va guruhlar mavjudligini allaqachon biladi. Siz faqat mahsulot interfeysi orqali yoki to&#8217;g&#8217;ridan-to&#8217;g&#8217;ri ActiveDirectory orqali kimning qaysi turdagi qurilmalarga kirish huquqiga ega ekanligini ko&#8217;rsatishingiz kerak.<\/p><\/td><td><img decoding=\"async\" src=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/2-6.jpg\" sizes=\"(max-width: 376px) 100vw, 376px\" srcset=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/2-6.jpg 376w, https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/2-6-300x196.jpg 300w\" alt=\"\u041f\u0440\u043e\u0441\u0442\u043e\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c\" width=\"376\" height=\"246\" data-ll-status=\"loaded\" \/><\/td><\/tr><tr><td><img decoding=\"async\" src=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/3-6.jpg\" sizes=\"(max-width: 375px) 100vw, 375px\" srcset=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/3-6.jpg 375w, https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/3-6-300x204.jpg 300w\" alt=\"\u041a\u043e\u043d\u0442\u0435\u043d\u0442\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437\" width=\"375\" height=\"255\" data-ll-status=\"loaded\" \/><\/td><td><h2>Kontent tahlili<\/h2><p>Rad etish \/ o&#8217;qish \/ yozish darajasida oddiy kirishni boshqarishdan tashqari, GFI EndPointSecurity uzatiladigan fayllar tarkibini tahlil qilish funktsiyasiga ega: kalit so&#8217;zlarni yoki oddiy iboralarni o&#8217;rnating va mahsulot maxfiy ma&#8217;lumotlar uchun fayllar matnini tekshiradi.<\/p><\/td><\/tr><tr><td><h2>Ma&#8217;lumotlarni shifrlash<\/h2><p>Xodim tashqi qurilmaga biror narsa yozsa ham, u endi korporativ tarmoqdan tashqaridagi ma&#8217;lumotlarni o&#8217;qiy olmaydi. Fayllar kalit uzunligi 256 yoki 128 bit bo&#8217;lgan kuchli AES algoritmi yordamida shifrlangan.<\/p><\/td><td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/4-4.jpg\" sizes=\"(max-width: 377px) 100vw, 377px\" srcset=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/4-4.jpg 377w, https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/4-4-300x202.jpg 300w\" alt=\"\u0428\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0445\" width=\"377\" height=\"254\" data-ll-status=\"loaded\" \/><\/td><\/tr><tr><td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/5-4.jpg\" sizes=\"(max-width: 376px) 100vw, 376px\" srcset=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/5-4.jpg 376w, https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/5-4-300x199.jpg 300w\" alt=\"\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u0430\u044f \u043e\u0442\u0447\u0435\u0442\u043d\u043e\u0441\u0442\u044c\" width=\"376\" height=\"250\" data-ll-status=\"loaded\" \/><\/td><td><h2>Batafsil hisobot<\/h2><p>Hisobotlar foydalanuvchi harakatlari haqida to&#8217;liq ma&#8217;lumotni o&#8217;z ichiga oladi: kim, qachon, qayerga, qaysi faylni ko&#8217;chirishga harakat qilgan, ruxsat berilganmi. Faylning haqiqiy turi qanday edi (kengaytma almashtirilganda). Hisobotlarni oddiy rejalashtiruvchi yordamida avtomatlashtirish mumkin.<\/p><\/td><\/tr><tr><td><h2>Agentlarni o&#8217;rnatish<\/h2><p>GFI EndPointSecurity himoyalangan foydalanuvchi kompyuterlarida qo&#8217;lda yoki avtomatik ravishda o&#8217;rnatiladigan kirish siyosatlarining bajarilishini nazorat qilish uchun agent dasturlardan foydalanadi. Shu bilan birga, kompyuter tarmoqdan uzilgan taqdirda ham agent ishlashda davom etadi. Foydalanuvchi interfeysidan foydalanib, xodim ma&#8217;murdan kerakli faylni tashqi qurilmaga yoki undan ko&#8217;chirish uchun masofadan turib ruxsat so&#8217;rashi mumkin.<\/p><\/td><td>\u00a0<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/6-4.jpg\" sizes=\"(max-width: 377px) 100vw, 377px\" srcset=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/6-4.jpg 377w, https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/6-4-300x200.jpg 300w\" alt=\"\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u0430\u0433\u0435\u043d\u0442\u043e\u0432\" width=\"377\" height=\"251\" data-ll-status=\"loaded\" \/><\/td><\/tr><\/tbody><\/table><p>\u00a0<\/p><h2 style=\"text-align: center;\">GFI EndPointSecurity tizimi talablari<\/h2><h2>Uskuna<\/h2><ul><li>Protsessor: 2 gigagertsli<\/li><li>Operativ xotira: 512 MB (minimal); 1 GB (tavsiya etiladi)<\/li><li>Qattiq disk: 100 MB bo&#8217;sh joy<\/li><\/ul><h2>Dasturiy ta&#8217;minot<\/h2><p>Operatsion tizim (x64 yoki x86):<\/p><ul><li>Microsoft Windows XP\u00a0Professional<\/li><li>Microsoft Windows Vista (Enterprise, Business yoki Ultimate)<\/li><li>Microsoft Windows 7<\/li><li>Microsoft Windows\u00a08 Professional (x86)<\/li><li>Microsoft Windows\u00a08 Enterprise (x64)<\/li><li>Microsoft Windows 2003 Server<\/li><li>Microsoft Small Business Server 2003<\/li><li>Microsoft Windows 2008 Server (Standart yoki Enterprise) (SR1 &#8211; SR2)<\/li><li>Microsoft Windows 2008 Server R2<\/li><li>Microsoft Small Business Server 2008<\/li><li>Microsoft Windows 2012 Server (Standart yoki Enterprise nashri)<\/li><li>Microsoft Windows Small Business Server 2012<\/li><\/ul><h2>Boshqa komponentlar<\/h2><ul><li>Internet Explorer 5.5 yoki undan yuqori<\/li><li>NET Framework version 4.0<\/li><li>Ma&#8217;lumotlar bazasi: SQL Server 2000, 2005, 2008<\/li><li>Port: TCP 1116 (standart)<\/li><\/ul><p><strong>Eslatma 1:<\/strong> Xavfsizlik devori GFI EndPointSecurity Server va GFI EndPointSecurity agentlari bilan ishlaydigan kompyuterlar o&#8217;rtasida ulanishga ruxsat berish uchun sozlanishi kerak.<\/p><p><strong>Eslatma 2:<\/strong> GFI EndPointSecurity faqat administrator huquqlari bilan o&#8217;rnatilishi va ishga tushirilishi mumkin.<\/p><h2>Agent &#8211; apparat talablari<\/h2><ul><li>Protsessor: 1 gigagertsli<\/li><li>Operativ xotira: 256 MB (minimal); 512 MB (tavsiya etiladi)<\/li><li>Qattiq disk: 50 MB bo&#8217;sh joy<\/li><\/ul><h2>Agent &#8211; tizim talablari<\/h2><h3>Operatsion tizim (x64 yoki x86):<\/h3><ul><li>Microsoft Windows Server 2008 R2\u00d764 (Standart yoki Enterprise nashri)<\/li><li>Microsoft Windows Server 2008 (standart yoki korporativ nashr)<\/li><li>Microsoft Windows Server 2003 (standart, korporativ yoki veb-nashr)<\/li><li>Microsoft Windows\u00a08 Professional (x86)<\/li><li>Microsoft Windows\u00a08 Enterprise (x64)<\/li><li>Microsoft Windows 7 (Enterprise, Professional yoki Ultimate nashrlari)<\/li><li>Microsoft Windows Vista (Enterprise, Business yoki Ultimate nashrlari)<\/li><li>Microsoft Windows\u00a0XP (Professional edition)<\/li><li>Microsoft Windows Small Business Server 2008 (Standard yoki Enterprise editions)<\/li><li>Microsoft Windows Small Business Server 2003<\/li><li>Microsoft Windows 2012 Server (Standard yoki Enterprise edition)<\/li><li>Microsoft Windows Small Business Server 2012<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tashqi xotira qurilmalari orqali ma&#8217;lumotlarning oqib ketishidan himoya qilish: USB flesh-disklar, tashqi HDDlar, tarmoq kartalari, kameralar, smartfonlar. Kompyuterni korporativ tarmoqqa ulamasdan ham ishlaydi. Portativ qurilmalar yordamida tarmog&#8217;ingizni ma&#8217;lumotlar sizib chiqishidan himoya qiling GFI EndPointSecurity ma&#8217;lumotlar sizib chiqishi xavfini kamaytiradi &#8211; Ma&#8217;lumotlarning sizib chiqishi xavfini baholash &#8211; Ma&#8217;lumotlarni baholash &#8211; Kirish nazorati Ma&#8217;lumotlar oqishidan himoya qilish&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"GFI EndPointSecurity","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","footnotes":""},"categories":[3938],"tags":[],"class_list":["post-5467","post","type-post","status-publish","format-standard","hentry","category-mahsulot"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>GFI EndPointSecurity - GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab<\/title>\n<meta name=\"description\" content=\"GFI EndPointSecurity . \u041f\u0440\u0438\u043e\u0431\u0440\u0435\u0442\u0430\u0439\u0442\u0435 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 GFI \u0438 Kerio \u0432 \u0422\u0430\u0448\u043a\u0435\u043d\u0442\u0435 \u043e\u0442 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0430\u0440\u0442\u043d\u0451\u0440\u0430 GFI \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/\" \/>\n<meta property=\"og:locale\" content=\"uz_UZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GFI EndPointSecurity\" \/>\n<meta property=\"og:description\" content=\"GFI EndPointSecurity - GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gfisoftwareuz\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-19T09:01:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-12T05:51:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/1-6.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gfisoftwareuz\" \/>\n<meta name=\"twitter:site\" content=\"@gfisoftwareuz\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 daqiqa\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/#\\\/schema\\\/person\\\/994f17323a696de465512d31e6df1fc7\"},\"headline\":\"GFI EndPointSecurity\",\"datePublished\":\"2021-01-19T09:01:20+00:00\",\"dateModified\":\"2026-04-12T05:51:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/\"},\"wordCount\":567,\"publisher\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gfi-software.uz\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/1-6.jpg\",\"articleSection\":[\"Mahsulot\"],\"inLanguage\":\"uz-UZ\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/\",\"url\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/\",\"name\":\"GFI EndPointSecurity - GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gfi-software.uz\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/1-6.jpg\",\"datePublished\":\"2021-01-19T09:01:20+00:00\",\"dateModified\":\"2026-04-12T05:51:07+00:00\",\"description\":\"GFI EndPointSecurity . \u041f\u0440\u0438\u043e\u0431\u0440\u0435\u0442\u0430\u0439\u0442\u0435 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 GFI \u0438 Kerio \u0432 \u0422\u0430\u0448\u043a\u0435\u043d\u0442\u0435 \u043e\u0442 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0430\u0440\u0442\u043d\u0451\u0440\u0430 GFI \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/#breadcrumb\"},\"inLanguage\":\"uz-UZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gfi-software.uz\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/1-6.jpg\",\"contentUrl\":\"https:\\\/\\\/gfi-software.uz\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/1-6.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/mahsulot\\\/gfi-endpointsecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f\",\"item\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/bosh-sahifa\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GFI EndPointSecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/#website\",\"url\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/\",\"name\":\"GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab\",\"description\":\"Kerio Control, Kerio Connect, \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435 Kerio NG. \u041e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u0430\u0440\u0442\u043d\u0451\u0440 GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.\",\"publisher\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/#organization\"},\"alternateName\":\"GFI Software Uzbekistan\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"uz-UZ\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/#organization\",\"name\":\"\u041e\u041e\u041e Starlab\",\"alternateName\":\"GFI Software\",\"url\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/gfi-software.uz\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/GFI-Software-logo-2.png\",\"contentUrl\":\"https:\\\/\\\/gfi-software.uz\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/GFI-Software-logo-2.png\",\"width\":215,\"height\":52,\"caption\":\"\u041e\u041e\u041e Starlab\"},\"image\":{\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/gfisoftwareuz\",\"https:\\\/\\\/x.com\\\/gfisoftwareuz\",\"https:\\\/\\\/www.instagram.com\\\/gfisoftwareuz\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/gfisoftwareuz\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/gfi-software.uz\\\/uz\\\/#\\\/schema\\\/person\\\/994f17323a696de465512d31e6df1fc7\",\"name\":\"admin\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"GFI EndPointSecurity - GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab","description":"GFI EndPointSecurity . \u041f\u0440\u0438\u043e\u0431\u0440\u0435\u0442\u0430\u0439\u0442\u0435 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 GFI \u0438 Kerio \u0432 \u0422\u0430\u0448\u043a\u0435\u043d\u0442\u0435 \u043e\u0442 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0430\u0440\u0442\u043d\u0451\u0440\u0430 GFI \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/","og_locale":"uz_UZ","og_type":"article","og_title":"GFI EndPointSecurity","og_description":"GFI EndPointSecurity - GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab","og_url":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/","og_site_name":"GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab","article_publisher":"https:\/\/www.facebook.com\/gfisoftwareuz","article_published_time":"2021-01-19T09:01:20+00:00","article_modified_time":"2026-04-12T05:51:07+00:00","og_image":[{"url":"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/1-6.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@gfisoftwareuz","twitter_site":"@gfisoftwareuz","twitter_misc":{"Written by":"admin","Est. reading time":"5 daqiqa"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/#article","isPartOf":{"@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/"},"author":{"name":"admin","@id":"https:\/\/gfi-software.uz\/uz\/#\/schema\/person\/994f17323a696de465512d31e6df1fc7"},"headline":"GFI EndPointSecurity","datePublished":"2021-01-19T09:01:20+00:00","dateModified":"2026-04-12T05:51:07+00:00","mainEntityOfPage":{"@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/"},"wordCount":567,"publisher":{"@id":"https:\/\/gfi-software.uz\/uz\/#organization"},"image":{"@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/1-6.jpg","articleSection":["Mahsulot"],"inLanguage":"uz-UZ"},{"@type":"WebPage","@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/","url":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/","name":"GFI EndPointSecurity - GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab","isPartOf":{"@id":"https:\/\/gfi-software.uz\/uz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/#primaryimage"},"image":{"@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/1-6.jpg","datePublished":"2021-01-19T09:01:20+00:00","dateModified":"2026-04-12T05:51:07+00:00","description":"GFI EndPointSecurity . \u041f\u0440\u0438\u043e\u0431\u0440\u0435\u0442\u0430\u0439\u0442\u0435 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 GFI \u0438 Kerio \u0432 \u0422\u0430\u0448\u043a\u0435\u043d\u0442\u0435 \u043e\u0442 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0430\u0440\u0442\u043d\u0451\u0440\u0430 GFI \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.","breadcrumb":{"@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/#breadcrumb"},"inLanguage":"uz-UZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/"]}]},{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/#primaryimage","url":"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/1-6.jpg","contentUrl":"https:\/\/gfi-software.uz\/wp-content\/uploads\/2018\/09\/1-6.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/gfi-software.uz\/uz\/mahsulot\/gfi-endpointsecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f","item":"https:\/\/gfi-software.uz\/uz\/bosh-sahifa\/"},{"@type":"ListItem","position":2,"name":"GFI EndPointSecurity"}]},{"@type":"WebSite","@id":"https:\/\/gfi-software.uz\/uz\/#website","url":"https:\/\/gfi-software.uz\/uz\/","name":"GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435 \u2014 Starlab","description":"Kerio Control, Kerio Connect, \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435 Kerio NG. \u041e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u0430\u0440\u0442\u043d\u0451\u0440 GFI Software \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435.","publisher":{"@id":"https:\/\/gfi-software.uz\/uz\/#organization"},"alternateName":"GFI Software Uzbekistan","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gfi-software.uz\/uz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"uz-UZ"},{"@type":"Organization","@id":"https:\/\/gfi-software.uz\/uz\/#organization","name":"\u041e\u041e\u041e Starlab","alternateName":"GFI Software","url":"https:\/\/gfi-software.uz\/uz\/","logo":{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/gfi-software.uz\/uz\/#\/schema\/logo\/image\/","url":"https:\/\/gfi-software.uz\/wp-content\/uploads\/2022\/03\/GFI-Software-logo-2.png","contentUrl":"https:\/\/gfi-software.uz\/wp-content\/uploads\/2022\/03\/GFI-Software-logo-2.png","width":215,"height":52,"caption":"\u041e\u041e\u041e Starlab"},"image":{"@id":"https:\/\/gfi-software.uz\/uz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gfisoftwareuz","https:\/\/x.com\/gfisoftwareuz","https:\/\/www.instagram.com\/gfisoftwareuz\/","https:\/\/www.pinterest.com\/gfisoftwareuz\/"]},{"@type":"Person","@id":"https:\/\/gfi-software.uz\/uz\/#\/schema\/person\/994f17323a696de465512d31e6df1fc7","name":"admin"}]}},"_links":{"self":[{"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/posts\/5467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/comments?post=5467"}],"version-history":[{"count":1,"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/posts\/5467\/revisions"}],"predecessor-version":[{"id":7257,"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/posts\/5467\/revisions\/7257"}],"wp:attachment":[{"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/media?parent=5467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/categories?post=5467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gfi-software.uz\/uz\/wp-json\/wp\/v2\/tags?post=5467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}