?
Solved

GFI EndPoint esecagntservice.exe eats about 2GB of RAM

Posted on 2009-03-29
7
Medium Priority
?
5,564 Views
Last Modified: 2012-05-06
hi,


An agent has been deployed to a xp sp3 computer with 4gb of ram... the esecagntservice.exe service eats about 2gb... why?

I tried to delete de agent (using console) and then re-install.... same problem


What can I do?


Best regards
0
Comment
Question by:heze54
  • 4
  • 3
7 Comments
 
LVL 28

Expert Comment

by:burrcm
ID: 24017878
Don't know it at all, but when the frnt page of their website (http://www.gfi.com/endpointsecurity/) says -

New version of GFI EndPointSecurity released - November 29, 2007 - GFI Software announces the release of the latest version of GFI EndPointSecurity, a solution that helps to control the use of portable storage devices such as iPods, flash drives, USB sticks and PDAs on the network and prevent the leakage or theft of sensitive data.

I would be looking for something newer. It seems they have dropped the ball.

Chris B
0
 

Author Comment

by:heze54
ID: 24017995
Hi,

I posted at this forum... but no response.. I? running 4.1 version(the latest)


Best regards
0
 
LVL 28

Expert Comment

by:burrcm
ID: 24028016
Sorry you aren't getting answers, but I think this program is probably a lemon. You will get responses when a program is well known and used by many. This would not appear to be the case here. Half a dozen undated and unverifiable testimonials, awards from questionable sources, nothing about it inspires confidence.

Chris B
0
2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

 

Author Comment

by:heze54
ID: 24028419
Ajammmmm


other software to try? Please no desktop authority

GFI says.. "is an internal problem we will fix as soon as possible"...
0
 
LVL 28

Accepted Solution

by:
burrcm earned 1500 total points
ID: 24037046
I guess if I was considering such a path, I would start with something like this - http://www.endpointsecurity.org/ to find out what others were using and how their experiences compared.

Chris B
0
 

Author Comment

by:heze54
ID: 24043412
Hi,
Where at this page? forum?

Best regards
0
 
LVL 28

Expert Comment

by:burrcm
ID: 24057747
Start with the forum FAQ, register and check it all out......(Don't get sucked in for any payments though).

Chris B
0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
How does someone stay on the right and legal side of the hacking world?
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses
Course of the Month14 days, 16 hours left to enroll

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question