All Research Sponsored By:GFI Software

The Need for Effective Event Management
PRODUCT LITERATURE: This paper examines various corporate needs and provides information on how GFI EventsManager can help corporations achieve important goals.
Posted: 22 Jun 2007 | Published: 01 Jun 2007


GFI EventsManager
TRIAL SOFTWARE: GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.
Posted: 22 Jun 2007 | Premiered: 01 Jun 2007


Why Organizations Need to Archive Email
WHITE PAPER: Email has become an integral part of the business workflow. This paper explains why email archiving must be an integral part of every organization and examines the different methods for deploying and managing email archive solutions in an organization.
Posted: 23 Jan 2007 | Published: 24 Jan 2007


Pod Slurping - An Easy Technique for Stealing Data
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006


Protecting Your Network against Email Threats
PRODUCT LITERATURE: This white paper explains why anti-virus software alone is not enough to protect your organization against the current and future onslaught of email viruses and threats.
Posted: 02 May 2006 | Published: 01 May 2006


Patch Management with GFI LANguard N.S.S. & Microsoft SUS
PRODUCT LITERATURE: This white paper provides an overview of how to use GFI LANguard Network Security Scanner (N.S.S.) and Microsoft Software Update Services (SUS) to keep your network automatically updated with the latest security patches.
Posted: 02 May 2006 | Published: 01 May 2006


The Corporate Threat Posed by Email Trojans
PRODUCT LITERATURE: Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
Posted: 02 May 2006 | Published: 01 May 2006


Why Bayesian Filtering Is the Most Effective Anti-spam Technology
PRODUCT LITERATURE: This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.
Posted: 02 May 2006 | Published: 01 May 2006


Why You Need an Email Exploit Detection Engine
PRODUCT LITERATURE: This white paper explains what email exploits are, provides examples of common email exploits, and discusses why a non signature-based approach (i.e., not a virus engine) is needed to protect against email exploits.
Posted: 02 May 2006 | Published: 01 May 2006


Why One Virus Engine Is Not Enough
PRODUCT LITERATURE: This white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time.
Posted: 02 May 2006 | Published: 01 May 2006


GFI MailSecurity's Deployment Strategies
PRODUCT LITERATURE: GFI MailSecurity can be deployed as an SMTP gateway or as a VS API version for Exchange 2000/2003.
Posted: 02 May 2006 | Published: 01 May 2006


How to Perform Network-wide Security Event Log Monitoring
PRODUCT LITERATURE: This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LANguard S.E.L.M.
Posted: 02 May 2006 | Published: 01 May 2006


GFI MailArchiver
PRODUCT LITERATURE: The winner of this year's Best Mail Archiving award is GFI MailArchiver for Exchange.
Posted: 02 May 2006 | Published: 01 Jan 2005


Integrated Network Faxing Key to Improved Productivity and Information Security
PRODUCT LITERATURE: This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace.
Posted: 02 May 2006 | Published: 01 May 2006


GFI LANguard Security Event Log Monitor - Downloads
TRIAL SOFTWARE: GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
Posted: 02 May 2006 | Premiered: 01 May 2006


How to Keep Spam off Your Network
PRODUCT LITERATURE: A buyers' guide to anti-spam software, this white paper highlights the key features to look for in anti-spam software and why.
Posted: 02 May 2006 | Published: 01 May 2006


Getting Started: Performing an Audit
PRODUCT LITERATURE: GFI LANguard N.S.S. automates the process of a security audit & easily identifies common vulnerabilities within your network in a short time.
Posted: 02 May 2006 | Published: 02 May 2006


Deploying GFI LANguard S.E.L.M.
PRODUCT LITERATURE: This white paper gives an overview of how GFI LANguard S.E.L.M. works and discusses installation and deployment issues, enabling you to choose the best way to deploy the product on your network.
Posted: 02 May 2006 | Published: 01 May 2006


GFI FAXmaker for Exchange/SMTP: Network Fax Server for Exchange/SMTP
BROCHURE: GFI FAXmaker for Exchange/SMTP excels in its seamless integration with your mail server.
Posted: 02 May 2006 | Published: 01 May 2006