All Research Sponsored By:GFI Software

Web Monitoring for Employee Productivity Enhancement
WHITE PAPER: Employees both want and don't want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement. Web monitoring is good for business.
Posted: 03 Jun 2009 | Published: 01 Jun 2009


PODCAST: Integrated Network Faxing: The Key To Improved Productivity And Information Security
PODCAST: With an integrated network faxing solution, you can save thousands of dollars in labor costs alone and improve productivity. At the same time your faxes can be readily prepared, and more professional in appearance. Higher productivity and lower costs...
Posted: 01 Apr 2008 | Premiered: Jan 1, 2008

TOPICS:  Fax Services

GFI FAXmaker - Network Fax Server for Exchange/SMTP
SOFTWARE LISTING: GFI FAXmaker is the leading enterprise quality fax server when it comes to reliability, ease of use and administration, and price.
Posted: 27 Mar 2008 | Published: 01 Mar 2008


Attachment Spam - The Latest Trend
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007


GFI MailArchiver 5 for Exchange
TRIAL SOFTWARE: GFI is a leading supplier of security and messaging tools for network administrators. GFI empowers the network administrator to purchase security and messaging solutions with superior technology at unbeatable prices.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

TOPICS:  Email Archiving

GFI FAXmaker for Exchange/SMTP/Lotus
PRODUCT DEMO: Download this free trial of GFI Faxmaker to improve efficiency of business processes, provide backup for fax documents to increase compliance and help reduce time IT admins spend on fax errors.
Posted: 11 Oct 2007 | Premiered: 01 Oct 2007


Sending Faxes in Real-time over an IP Network
PRODUCT LITERATURE: This technical white paper gives an introduction to fax over Internet Protocol (FoIP) and explains the various usages and advantages of FoIP.
Posted: 25 Jun 2007 | Published: 01 Jun 2007


Targeted Cyber Attacks
PRODUCT LITERATURE: Cyber attack is the name given by (usually sensationalist) articles and documents describing crimes that occur in a virtual world as opposed to tangible attacks such as war.
Posted: 25 Jun 2007 | Published: 25 Jun 2007


The Threats Posed by Portable Storage Devices
PRODUCT LITERATURE: This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Posted: 25 Jun 2007 | Published: 01 Jun 2007


GFI EventsManager
TRIAL SOFTWARE: GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.
Posted: 22 Jun 2007 | Premiered: 01 Jun 2007


The Need for Effective Event Management
PRODUCT LITERATURE: This paper examines various corporate needs and provides information on how GFI EventsManager can help corporations achieve important goals.
Posted: 22 Jun 2007 | Published: 01 Jun 2007


Why Organizations Need to Archive Email
WHITE PAPER: Email has become an integral part of the business workflow. This paper explains why email archiving must be an integral part of every organization and examines the different methods for deploying and managing email archive solutions in an organization.
Posted: 23 Jan 2007 | Published: 24 Jan 2007


Pod Slurping - An Easy Technique for Stealing Data
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006


The Corporate Threat Posed by Email Trojans
PRODUCT LITERATURE: Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
Posted: 02 May 2006 | Published: 01 May 2006


Why Bayesian Filtering Is the Most Effective Anti-spam Technology
PRODUCT LITERATURE: This white paper describes how Bayesian filtering works and explains why it is the best way to combat spam.
Posted: 02 May 2006 | Published: 01 May 2006


Why You Need an Email Exploit Detection Engine
PRODUCT LITERATURE: This white paper explains what email exploits are, provides examples of common email exploits, and discusses why a non signature-based approach (i.e., not a virus engine) is needed to protect against email exploits.
Posted: 02 May 2006 | Published: 01 May 2006


Why One Virus Engine Is Not Enough
PRODUCT LITERATURE: This white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time.
Posted: 02 May 2006 | Published: 01 May 2006


Protecting Your Network against Email Threats
PRODUCT LITERATURE: This white paper explains why anti-virus software alone is not enough to protect your organization against the current and future onslaught of email viruses and threats.
Posted: 02 May 2006 | Published: 01 May 2006


Patch Management with GFI LANguard N.S.S. & Microsoft SUS
PRODUCT LITERATURE: This white paper provides an overview of how to use GFI LANguard Network Security Scanner (N.S.S.) and Microsoft Software Update Services (SUS) to keep your network automatically updated with the latest security patches.
Posted: 02 May 2006 | Published: 01 May 2006


GFI MailSecurity's Deployment Strategies
PRODUCT LITERATURE: GFI MailSecurity can be deployed as an SMTP gateway or as a VS API version for Exchange 2000/2003.
Posted: 02 May 2006 | Published: 01 May 2006


GFI LANguard Security Event Log Monitor - Downloads
TRIAL SOFTWARE: GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
Posted: 02 May 2006 | Premiered: 01 May 2006


How to Keep Spam off Your Network
PRODUCT LITERATURE: A buyers' guide to anti-spam software, this white paper highlights the key features to look for in anti-spam software and why.
Posted: 02 May 2006 | Published: 01 May 2006


How to Perform Network-wide Security Event Log Monitoring
PRODUCT LITERATURE: This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LANguard S.E.L.M.
Posted: 02 May 2006 | Published: 01 May 2006


GFI MailArchiver
PRODUCT LITERATURE: The winner of this year's Best Mail Archiving award is GFI MailArchiver for Exchange.
Posted: 02 May 2006 | Published: 01 Jan 2005


Integrated Network Faxing Key to Improved Productivity and Information Security
PRODUCT LITERATURE: This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace.
Posted: 02 May 2006 | Published: 01 May 2006