All Research Sponsored By:GFI Software

GFI WebMonitor 2012
TRIAL SOFTWARE: Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.
Posted: 09 Mar 2012 | Premiered: 09 Mar 2012


Security considerations for small and medium-sized enterprises (SMEs)
WHITE PAPER: SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.
Posted: 20 Feb 2012 | Published: 20 Feb 2012


Social Networking malware: The dangers facing SMBs
WHITE PAPER: View this paper to explore the rise of social networking, the types of malware targeting social platforms, how SMBs can protect themselves against today’s social threats, and more.
Posted: 21 Nov 2011 | Published: 21 Nov 2011


Messaging and Web Security Best Practices for 2011 and Beyond
WHITE PAPER: This paper discusses the threats organizations face from spam, malware and other threats directed at messaging and Web capabilities. View now to explore these threats and learn best practices for addressing these challenges.
Posted: 21 Nov 2011 | Published: 01 Mar 2011


Presentation Transcript: Revelations and Realities of Endpoint Security
PRESENTATION TRANSCRIPT: Companies face numerous complexities when securing endpoints. In this presentation transcript, learn how to evaluate your business needs and come up with a comprehensive strategy to address endpoint security. Experts discuss both challenges with endpoint security as well as solutions available today.
Posted: 29 Jul 2011 | Published: 29 Jul 2011


Presentation Transcript: Patch Management for the IT Infrastructure
PRESENTATION TRANSCRIPT: Keeping up with patches is a tedious and time consuming task for security pros, and often prompts them to look for a more efficient and effective solution. This presentation transcript discusses a patch management approach that offers effective monitoring and increased productivity.
Posted: 04 May 2011 | Published: 04 May 2011


Presentation Transcript: Best Practices for Scheduled Security Update Cycle
PRESENTATION TRANSCRIPT: In this presentation transcript, Nick Lewis discusses the best ways to efficiently handle vendor security updates, how to prioritize patch deployment on mission-critical and non-mission critical systems, and why testing patches before deployment is such a crucial step.
Posted: 04 May 2011 | Published: 04 May 2011


Why Customers Love VIPRE Business
WHITE PAPER: This paper examines that selecting and anti-virus solution for your organization is an important decision. VIPRE Business offers an easy-to-use management console that gets you up and running fast.
Posted: 14 Mar 2011 | Published: 11 Mar 2011


Protecting Against the New Wave of Malware
WHITE PAPER: Managing threats to the endpoint infrastructure is becoming increasingly difficult for most organizations. At the same time, many anti-malware defenses are not keeping up with the growing threats posed by malware. This white paper addresses the variety of issues facing organizations today in the context of their system manaagement challenges.
Posted: 14 Mar 2011 | Published: 11 Mar 2011


MSP’s Single Most Important Marketing Message
WHITE PAPER: In this article Chris Martin discusses the importance of marketing yourself to your clients and how you should do it.
Posted: 22 Dec 2010 | Published: 22 Dec 2010


The Best Way to Deliver IT Support to Businesses as an MSP
WHITE PAPER: This paper examines the best ways to deliver IT support to businesses as a managed services provider.
Posted: 22 Dec 2010 | Published: 22 Dec 2010


Survey Shows that SaaS Can Save You Money
WHITE PAPER: This article discusses the results found during a survey on RMM Software, this is the software IT Company’s/MSP’s use to run their technical operations. A large percentage of RMM software users are saying they generally believe RMM software is over-produced (over-engineered) and they either never or very slowly get round to using it.
Posted: 22 Dec 2010 | Published: 22 Dec 2010


GFI MAX Building Blocks – The Answer to IT Services
WHITE PAPER: In this article Chris Martin discusses his experience as a managed services provider to small businesses in the surrounding area with one of the fastest growing and most well-reputed IT Support Companies in his country. He also discusses how he started working at GFI and creating the idea for GFI MAX Remote Management software.
Posted: 22 Dec 2010 | Published: 22 Dec 2010


Managed Services or Break fix? One Size Doesn’t Fit All
WHITE PAPER: This paper examines the benefits of Managed Services using the GFI Building Blocks program.
Posted: 22 Dec 2010 | Published: 22 Dec 2010


9 Advantages to Using Remote Support Tools for an IT Support Company/Consultant
WHITE PAPER: With the imminent announcement of GFI MAX Remote Management’s new and greatly improved remote support tool ‘Take Control’ – it’s time to take a close look at the world of Remote IT Support.
Posted: 22 Dec 2010 | Published: 22 Dec 2010


GFI MAX Building Blocks & MSP University Podcast
PODCAST: This podcast discusses how GFI MAX Building Blocks methodology can help you overcome challenges with converting your clients in Managed Services and start making money.
Posted: 10 Dec 2010 | Premiered: Dec 10, 2010


Web Monitoring for Employee Productivity Enhancement
WHITE PAPER: Employees both want and don't want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement. Web monitoring is good for business.
Posted: 03 Jun 2009 | Published: 01 Jun 2009


PODCAST: Integrated Network Faxing: The Key To Improved Productivity And Information Security
PODCAST: With an integrated network faxing solution, you can save thousands of dollars in labor costs alone and improve productivity. At the same time your faxes can be readily prepared, and more professional in appearance. Higher productivity and lower costs...
Posted: 01 Apr 2008 | Premiered: Jan 1, 2008

TOPICS:  Fax Services

GFI FAXmaker - Network Fax Server for Exchange/SMTP
SOFTWARE LISTING: GFI FAXmaker is the leading enterprise quality fax server when it comes to reliability, ease of use and administration, and price.
Posted: 27 Mar 2008 | Published: 01 Mar 2008


Attachment Spam - The Latest Trend
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007


GFI MailArchiver 5 for Exchange
TRIAL SOFTWARE: GFI is a leading supplier of security and messaging tools for network administrators. GFI empowers the network administrator to purchase security and messaging solutions with superior technology at unbeatable prices.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

TOPICS:  Email Archiving

GFI FAXmaker for Exchange/SMTP/Lotus
PRODUCT DEMO: Download this free trial of GFI Faxmaker to improve efficiency of business processes, provide backup for fax documents to increase compliance and help reduce time IT admins spend on fax errors.
Posted: 11 Oct 2007 | Premiered: 01 Oct 2007


Sending Faxes in Real-time over an IP Network
PRODUCT LITERATURE: This technical white paper gives an introduction to fax over Internet Protocol (FoIP) and explains the various usages and advantages of FoIP.
Posted: 25 Jun 2007 | Published: 01 Jun 2007


Targeted Cyber Attacks
PRODUCT LITERATURE: Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007


The Threats Posed by Portable Storage Devices
PRODUCT LITERATURE: This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Posted: 25 Jun 2007 | Published: 01 Jun 2007