Latest posts

Page 61

GFI New Monitis Aquisition!

We have now invested in a new acquisition – Monitis, the pioneer of cloud-based network and systems monitoring solutions. This acquisition further strengthens GFI’s ability to provide affordable end-to-end systems monitoring for small and medium-sized businesses (SMBs) and to be a one-stop shop for managing heterogeneous IT infrastructures, be they on-premise, hosted or in the […]

Continue reading

What Principles to Consider when Optimizing Web Security

In order to optimize the organization’s web security strategy, businesses should invest in good web filtering and web monitoring software, complementing the other security solutions they may have. Web filtering does to your organization what a mosquito net does to your skin – it keeps the bugs away whilst allowing air to pass through. The […]

Continue reading

Top 5 Web Security Issues

Cyber criminals have always posed a threat. But now their strategy has changed — and the results can prove devastating. This video examines five key methods of attack and suggests the best way you can respond.

Continue reading

What Is Fax over IP?

Fax over IP (FoIP) is the latest incarnation of the eminently reliable fax technology. It uses all the benefits that IP brings to elevate fax to a more modern level. It’s fast, secure and can use your existing network infrastructure to transmit faxes anywhere in the world. FoIP makes good sense. You can enjoy all […]

Continue reading

What is Email Archiving and Why Is It Important?

Companies the world over are relying increasingly on email — but are unable to manage it efficiently. Finding a particular email thread — or one that was deleted, dealing with PST files scattered across the orgnaization, handling demands for larger inboxes: These are all headaches that can be solved: This video provides valuable advice on […]

Continue reading

The PST File Headache

Email is the Internet’s original killer app. But relying increasingly on PST files simply creates bigger problems for you down the line. This video provides valuable advice on finding a pain-free solution.

Continue reading

Top 10 Vulnerable Applications on Your Network

If software is not kept updated across your IT estate, then your security could be at risk. This video identifies the Top 10 most targeted applications — and suggests how you can strengthen security and reliability despite the ever-increasing number of vulnerabilities on your network.

Continue reading

Why Faxing Is Still Relevant

Despite almost all business being conducted over email, fax still has a place in the modern organization. With email, senders’ identities cannot be verified, traffic can be intercepted or sniffed, and an email signature isn’t necessarily legally binding. With a fax, a signature is as legal as if you were standing right in front of […]

Continue reading

31 Things Admins Should Do to Increase Their Web Security

System admins need to deal with several issues to keep the company network running smoothly; the primary one being that of ensuring web security is maintained in the best way possible. For this reason, I have gathered a list of the 31 most important steps admins should consider to improve their web security strategy.

Continue reading

6 Features for Good Internet Traffic Monitoring

If you asked an employee what they understood by ‘monitoring Internet traffic’, they would probably say it is a simple process which is meant to ensure users do not access websites that they are not meant to visit on the company network. That’s part of the equation of course, but in reality there’s more to […]

Continue reading