Solved

GFI EndPoint esecagntservice.exe eats about 2GB of RAM

Posted on 2009-03-29
7
5,385 Views
Last Modified: 2012-05-06
hi,


An agent has been deployed to a xp sp3 computer with 4gb of ram... the esecagntservice.exe service eats about 2gb... why?

I tried to delete de agent (using console) and then re-install.... same problem


What can I do?


Best regards
0
Comment
Question by:heze54
  • 4
  • 3
7 Comments
 
LVL 28

Expert Comment

by:burrcm
ID: 24017878
Don't know it at all, but when the frnt page of their website (http://www.gfi.com/endpointsecurity/) says -

New version of GFI EndPointSecurity released - November 29, 2007 - GFI Software announces the release of the latest version of GFI EndPointSecurity, a solution that helps to control the use of portable storage devices such as iPods, flash drives, USB sticks and PDAs on the network and prevent the leakage or theft of sensitive data.

I would be looking for something newer. It seems they have dropped the ball.

Chris B
0
 

Author Comment

by:heze54
ID: 24017995
Hi,

I posted at this forum... but no response.. I? running 4.1 version(the latest)


Best regards
0
 
LVL 28

Expert Comment

by:burrcm
ID: 24028016
Sorry you aren't getting answers, but I think this program is probably a lemon. You will get responses when a program is well known and used by many. This would not appear to be the case here. Half a dozen undated and unverifiable testimonials, awards from questionable sources, nothing about it inspires confidence.

Chris B
0
Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:heze54
ID: 24028419
Ajammmmm


other software to try? Please no desktop authority

GFI says.. "is an internal problem we will fix as soon as possible"...
0
 
LVL 28

Accepted Solution

by:
burrcm earned 500 total points
ID: 24037046
I guess if I was considering such a path, I would start with something like this - http://www.endpointsecurity.org/ to find out what others were using and how their experiences compared.

Chris B
0
 

Author Comment

by:heze54
ID: 24043412
Hi,
Where at this page? forum?

Best regards
0
 
LVL 28

Expert Comment

by:burrcm
ID: 24057747
Start with the forum FAQ, register and check it all out......(Don't get sucked in for any payments though).

Chris B
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Join & Write a Comment

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now