Solved

GFI EndPoint esecagntservice.exe eats about 2GB of RAM

Posted on 2009-03-29
7
5,434 Views
Last Modified: 2012-05-06
hi,


An agent has been deployed to a xp sp3 computer with 4gb of ram... the esecagntservice.exe service eats about 2gb... why?

I tried to delete de agent (using console) and then re-install.... same problem


What can I do?


Best regards
0
Comment
Question by:heze54
  • 4
  • 3
7 Comments
 
LVL 28

Expert Comment

by:burrcm
ID: 24017878
Don't know it at all, but when the frnt page of their website (http://www.gfi.com/endpointsecurity/) says -

New version of GFI EndPointSecurity released - November 29, 2007 - GFI Software announces the release of the latest version of GFI EndPointSecurity, a solution that helps to control the use of portable storage devices such as iPods, flash drives, USB sticks and PDAs on the network and prevent the leakage or theft of sensitive data.

I would be looking for something newer. It seems they have dropped the ball.

Chris B
0
 

Author Comment

by:heze54
ID: 24017995
Hi,

I posted at this forum... but no response.. I? running 4.1 version(the latest)


Best regards
0
 
LVL 28

Expert Comment

by:burrcm
ID: 24028016
Sorry you aren't getting answers, but I think this program is probably a lemon. You will get responses when a program is well known and used by many. This would not appear to be the case here. Half a dozen undated and unverifiable testimonials, awards from questionable sources, nothing about it inspires confidence.

Chris B
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:heze54
ID: 24028419
Ajammmmm


other software to try? Please no desktop authority

GFI says.. "is an internal problem we will fix as soon as possible"...
0
 
LVL 28

Accepted Solution

by:
burrcm earned 500 total points
ID: 24037046
I guess if I was considering such a path, I would start with something like this - http://www.endpointsecurity.org/ to find out what others were using and how their experiences compared.

Chris B
0
 

Author Comment

by:heze54
ID: 24043412
Hi,
Where at this page? forum?

Best regards
0
 
LVL 28

Expert Comment

by:burrcm
ID: 24057747
Start with the forum FAQ, register and check it all out......(Don't get sucked in for any payments though).

Chris B
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question