ºÝºÝߣshows by User: GFISoftware / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: GFISoftware / Tue, 11 Jun 2013 08:21:35 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: GFISoftware Spotlight on GFI EndPoint Security 2013 /slideshow/spotlight-on-gfi-endpoint-security-2013/22806943 spotlightongfiendpointsecurity2013v2-130611082135-phpapp02
]]>

]]>
Tue, 11 Jun 2013 08:21:35 GMT /slideshow/spotlight-on-gfi-endpoint-security-2013/22806943 GFISoftware@slideshare.net(GFISoftware) Spotlight on GFI EndPoint Security 2013 GFISoftware <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/spotlightongfiendpointsecurity2013v2-130611082135-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Spotlight on GFI EndPoint Security 2013 from GFI Software
]]>
1436 3 https://cdn.slidesharecdn.com/ss_thumbnails/spotlightongfiendpointsecurity2013v2-130611082135-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network Environments /slideshow/network-environment-keytosuccessforyourbusiness/11332142 networkenvironmentkeytosuccessforyourbusiness-120130044721-phpapp02
Your network environment is one of the keys to the success of your business. Most business people don’t fully believe this, even after long discussions and mounds of evidence to the contrary.]]>

Your network environment is one of the keys to the success of your business. Most business people don’t fully believe this, even after long discussions and mounds of evidence to the contrary.]]>
Mon, 30 Jan 2012 04:47:16 GMT /slideshow/network-environment-keytosuccessforyourbusiness/11332142 GFISoftware@slideshare.net(GFISoftware) Network Environments GFISoftware Your network environment is one of the keys to the success of your business. Most business people don’t fully believe this, even after long discussions and mounds of evidence to the contrary. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/networkenvironmentkeytosuccessforyourbusiness-120130044721-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Your network environment is one of the keys to the success of your business. Most business people don’t fully believe this, even after long discussions and mounds of evidence to the contrary.
Network Environments from GFI Software
]]>
816 3 https://cdn.slidesharecdn.com/ss_thumbnails/networkenvironmentkeytosuccessforyourbusiness-120130044721-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Threats Posed by Portable Storage Devices /slideshow/threat-posedbyportablestoragedevices/11331926 threat-posed-by-portable-storage-devices-120130043116-phpapp01
In a society where the use of portable storage devices is commonplace, there is a real risk to business. The threat that these devices pose to corporations and organizations is often ignored. This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.]]>

In a society where the use of portable storage devices is commonplace, there is a real risk to business. The threat that these devices pose to corporations and organizations is often ignored. This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.]]>
Mon, 30 Jan 2012 04:31:14 GMT /slideshow/threat-posedbyportablestoragedevices/11331926 GFISoftware@slideshare.net(GFISoftware) The Threats Posed by Portable Storage Devices GFISoftware In a society where the use of portable storage devices is commonplace, there is a real risk to business. The threat that these devices pose to corporations and organizations is often ignored. This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/threat-posed-by-portable-storage-devices-120130043116-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In a society where the use of portable storage devices is commonplace, there is a real risk to business. The threat that these devices pose to corporations and organizations is often ignored. This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
The Threats Posed by Portable Storage Devices from GFI Software
]]>
3574 6 https://cdn.slidesharecdn.com/ss_thumbnails/threat-posed-by-portable-storage-devices-120130043116-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Hybrid Technology /slideshow/hybrid-technology/11331542 hybridtechnology-120130040102-phpapp01
As the price of storage and bandwidth continues to drop fast, Cloud-based services are becoming more and more attractive to small and medium-sized businesses (SMBs) which are seeking to reduce licensing costs, avoid recruiting IT staff and focus fully on their core responsibility - growing the business.]]>

As the price of storage and bandwidth continues to drop fast, Cloud-based services are becoming more and more attractive to small and medium-sized businesses (SMBs) which are seeking to reduce licensing costs, avoid recruiting IT staff and focus fully on their core responsibility - growing the business.]]>
Mon, 30 Jan 2012 04:00:58 GMT /slideshow/hybrid-technology/11331542 GFISoftware@slideshare.net(GFISoftware) Hybrid Technology GFISoftware As the price of storage and bandwidth continues to drop fast, Cloud-based services are becoming more and more attractive to small and medium-sized businesses (SMBs) which are seeking to reduce licensing costs, avoid recruiting IT staff and focus fully on their core responsibility - growing the business. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/hybridtechnology-120130040102-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As the price of storage and bandwidth continues to drop fast, Cloud-based services are becoming more and more attractive to small and medium-sized businesses (SMBs) which are seeking to reduce licensing costs, avoid recruiting IT staff and focus fully on their core responsibility - growing the business.
Hybrid Technology from GFI Software
]]>
664 2 https://cdn.slidesharecdn.com/ss_thumbnails/hybridtechnology-120130040102-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Email Continuity /slideshow/email-continuity-11331017/11331017 emailcontinuity-120130032019-phpapp02
Email is a critical communications tool. Email downtime means a loss of productivity, possible compliance and regulatory issues related to data loss, or even lost revenues. Minimizing email downtime is an increasingly important part of an organization’s messaging infrastructure and of its disaster prevention and recovery strategy.]]>

Email is a critical communications tool. Email downtime means a loss of productivity, possible compliance and regulatory issues related to data loss, or even lost revenues. Minimizing email downtime is an increasingly important part of an organization’s messaging infrastructure and of its disaster prevention and recovery strategy.]]>
Mon, 30 Jan 2012 03:20:17 GMT /slideshow/email-continuity-11331017/11331017 GFISoftware@slideshare.net(GFISoftware) Email Continuity GFISoftware Email is a critical communications tool. Email downtime means a loss of productivity, possible compliance and regulatory issues related to data loss, or even lost revenues. Minimizing email downtime is an increasingly important part of an organization’s messaging infrastructure and of its disaster prevention and recovery strategy. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/emailcontinuity-120130032019-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Email is a critical communications tool. Email downtime means a loss of productivity, possible compliance and regulatory issues related to data loss, or even lost revenues. Minimizing email downtime is an increasingly important part of an organization’s messaging infrastructure and of its disaster prevention and recovery strategy.
Email Continuity from GFI Software
]]>
351 2 https://cdn.slidesharecdn.com/ss_thumbnails/emailcontinuity-120130032019-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding Data Backups /slideshow/understanding-data-backups/11330334 understandingdatabackups-120130022003-phpapp02
Data is the lifeblood of every organization yet many either fail to backup their data or they are not doing so properly. Losing data can be catastrophic for a business. This white paper explains why backups are important and the challenges they face. ]]>

Data is the lifeblood of every organization yet many either fail to backup their data or they are not doing so properly. Losing data can be catastrophic for a business. This white paper explains why backups are important and the challenges they face. ]]>
Mon, 30 Jan 2012 02:20:02 GMT /slideshow/understanding-data-backups/11330334 GFISoftware@slideshare.net(GFISoftware) Understanding Data Backups GFISoftware Data is the lifeblood of every organization yet many either fail to backup their data or they are not doing so properly. Losing data can be catastrophic for a business. This white paper explains why backups are important and the challenges they face. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/understandingdatabackups-120130022003-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data is the lifeblood of every organization yet many either fail to backup their data or they are not doing so properly. Losing data can be catastrophic for a business. This white paper explains why backups are important and the challenges they face.
Understanding Data Backups from GFI Software
]]>
414 2 https://cdn.slidesharecdn.com/ss_thumbnails/understandingdatabackups-120130022003-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data Backups /slideshow/wp-nobody-likesbackupwhitepaperfinal/11330212 wpnobodylikesbackupwhitepaperfinal-120130020610-phpapp02
Data is the lifeblood of every organization and business. Data theft and data loss through negligence or hardware failure can cause irreparable damage if the data is not easily retrievable. That is why making regular backups of an organization’s data are so important.]]>

Data is the lifeblood of every organization and business. Data theft and data loss through negligence or hardware failure can cause irreparable damage if the data is not easily retrievable. That is why making regular backups of an organization’s data are so important.]]>
Mon, 30 Jan 2012 02:06:08 GMT /slideshow/wp-nobody-likesbackupwhitepaperfinal/11330212 GFISoftware@slideshare.net(GFISoftware) Data Backups GFISoftware Data is the lifeblood of every organization and business. Data theft and data loss through negligence or hardware failure can cause irreparable damage if the data is not easily retrievable. That is why making regular backups of an organization’s data are so important. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/wpnobodylikesbackupwhitepaperfinal-120130020610-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data is the lifeblood of every organization and business. Data theft and data loss through negligence or hardware failure can cause irreparable damage if the data is not easily retrievable. That is why making regular backups of an organization’s data are so important.
Data Backups from GFI Software
]]>
455 2 https://cdn.slidesharecdn.com/ss_thumbnails/wpnobodylikesbackupwhitepaperfinal-120130020610-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Master Class Series /slideshow/backup-mshyperv-11329895/11329895 backup-ms-hyper-v-120130013008-phpapp01
Virtualization enables companies to build fully functional infrastructures that are easily recovered and maintained with minimal effort and reduced hardware costs. Through cloning and replication, IT industries can replicate and test clients' environments without breaking clients' business continuity.]]>

Virtualization enables companies to build fully functional infrastructures that are easily recovered and maintained with minimal effort and reduced hardware costs. Through cloning and replication, IT industries can replicate and test clients' environments without breaking clients' business continuity.]]>
Mon, 30 Jan 2012 01:30:06 GMT /slideshow/backup-mshyperv-11329895/11329895 GFISoftware@slideshare.net(GFISoftware) Master Class Series GFISoftware Virtualization enables companies to build fully functional infrastructures that are easily recovered and maintained with minimal effort and reduced hardware costs. Through cloning and replication, IT industries can replicate and test clients' environments without breaking clients' business continuity. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/backup-ms-hyper-v-120130013008-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Virtualization enables companies to build fully functional infrastructures that are easily recovered and maintained with minimal effort and reduced hardware costs. Through cloning and replication, IT industries can replicate and test clients&#39; environments without breaking clients&#39; business continuity.
Master Class Series from GFI Software
]]>
360 2 https://cdn.slidesharecdn.com/ss_thumbnails/backup-ms-hyper-v-120130013008-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Threats for SMBs /slideshow/security-threats-smes/11329758 securitythreatssmes-120130011256-phpapp01
Many small and medium sized businesses are still unaware of the threats that exist. This guide to security threats for SMBs outlines the most common threats and how they can be dealt with.]]>

Many small and medium sized businesses are still unaware of the threats that exist. This guide to security threats for SMBs outlines the most common threats and how they can be dealt with.]]>
Mon, 30 Jan 2012 01:12:54 GMT /slideshow/security-threats-smes/11329758 GFISoftware@slideshare.net(GFISoftware) Security Threats for SMBs GFISoftware Many small and medium sized businesses are still unaware of the threats that exist. This guide to security threats for SMBs outlines the most common threats and how they can be dealt with. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securitythreatssmes-120130011256-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Many small and medium sized businesses are still unaware of the threats that exist. This guide to security threats for SMBs outlines the most common threats and how they can be dealt with.
Security Threats for SMBs from GFI Software
]]>
649 3 https://cdn.slidesharecdn.com/ss_thumbnails/securitythreatssmes-120130011256-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security and SMBs /slideshow/security-considerations-forsmes/11329711 securityconsiderationsforsmes-120130010631-phpapp02
It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it.]]>

It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it.]]>
Mon, 30 Jan 2012 01:06:28 GMT /slideshow/security-considerations-forsmes/11329711 GFISoftware@slideshare.net(GFISoftware) Security and SMBs GFISoftware It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityconsiderationsforsmes-120130010631-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> It is never possible to guarantee that a company is totally secure or that a breach will not occur, however implementing the latest tools and providing ongoing, end-user education will minimize those risks and allow companies to focus more on growing their business rather than repairing it.
Security and SMBs from GFI Software
]]>
341 2 https://cdn.slidesharecdn.com/ss_thumbnails/securityconsiderationsforsmes-120130010631-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Vulnerability Management /slideshow/vulnerability-scanningwhitepaper-engen/11329565 vulnerability-scanning-whitepaperengen-120130004905-phpapp02
Managing a large and growing PC estate is no simple matter, particularly if you are doing it manually. Keeping a close watch on a couple of PCs can be straightforward, and a diligent IT manager will manage to keep such machines fully patched and free of troublesome software. But what happens when your estate grows beyond one or two machines?]]>

Managing a large and growing PC estate is no simple matter, particularly if you are doing it manually. Keeping a close watch on a couple of PCs can be straightforward, and a diligent IT manager will manage to keep such machines fully patched and free of troublesome software. But what happens when your estate grows beyond one or two machines?]]>
Mon, 30 Jan 2012 00:49:03 GMT /slideshow/vulnerability-scanningwhitepaper-engen/11329565 GFISoftware@slideshare.net(GFISoftware) Vulnerability Management GFISoftware Managing a large and growing PC estate is no simple matter, particularly if you are doing it manually. Keeping a close watch on a couple of PCs can be straightforward, and a diligent IT manager will manage to keep such machines fully patched and free of troublesome software. But what happens when your estate grows beyond one or two machines? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vulnerability-scanning-whitepaperengen-120130004905-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Managing a large and growing PC estate is no simple matter, particularly if you are doing it manually. Keeping a close watch on a couple of PCs can be straightforward, and a diligent IT manager will manage to keep such machines fully patched and free of troublesome software. But what happens when your estate grows beyond one or two machines?
Vulnerability Management from GFI Software
]]>
457 5 https://cdn.slidesharecdn.com/ss_thumbnails/vulnerability-scanning-whitepaperengen-120130004905-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Deploying GFI EventsManagerâ„¢ /slideshow/deploying-gfieventsmanager/11329415 deploying-gfi-eventsmanager-120130003003-phpapp02
This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues while enabling you to calculate the number of GFI EventsManager instances required on your network.]]>

This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues while enabling you to calculate the number of GFI EventsManager instances required on your network.]]>
Mon, 30 Jan 2012 00:30:01 GMT /slideshow/deploying-gfieventsmanager/11329415 GFISoftware@slideshare.net(GFISoftware) Deploying GFI EventsManagerâ„¢ GFISoftware This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues while enabling you to calculate the number of GFI EventsManager instances required on your network. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/deploying-gfi-eventsmanager-120130003003-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This technical white paper gives an overview of how GFI EventsManager works and discusses installation and deployment issues while enabling you to calculate the number of GFI EventsManager instances required on your network.
Deploying GFI EventsManagerâ„¢ from GFI Software
]]>
3506 4 https://cdn.slidesharecdn.com/ss_thumbnails/deploying-gfi-eventsmanager-120130003003-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Perform Network-wide Security Event Log Management /GFISoftware/networkwide-securityeventlogmonitoring networkwide-security-event-log-monitoring-120130001206-phpapp01
This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LanGuard S.E.L.M. (now GFI EventsManager). It is written by Randy Franklin Smith, author of the in-depth series on the Windows security log in Windows 2000 & .NET Magazine.]]>

This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LanGuard S.E.L.M. (now GFI EventsManager). It is written by Randy Franklin Smith, author of the in-depth series on the Windows security log in Windows 2000 & .NET Magazine.]]>
Mon, 30 Jan 2012 00:12:04 GMT /GFISoftware/networkwide-securityeventlogmonitoring GFISoftware@slideshare.net(GFISoftware) How to Perform Network-wide Security Event Log Management GFISoftware This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LanGuard S.E.L.M. (now GFI EventsManager). It is written by Randy Franklin Smith, author of the in-depth series on the Windows security log in Windows 2000 & .NET Magazine. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/networkwide-security-event-log-monitoring-120130001206-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This white paper explains the need to monitor security event logs network-wide and how you can achieve this using GFI LanGuard S.E.L.M. (now GFI EventsManager). It is written by Randy Franklin Smith, author of the in-depth series on the Windows security log in Windows 2000 &amp; .NET Magazine.
How to Perform Network-wide Security Event Log Management from GFI Software
]]>
803 4 https://cdn.slidesharecdn.com/ss_thumbnails/networkwide-security-event-log-monitoring-120130001206-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to configure IBM iSeries event collection with Audit and GFI EventsManager /slideshow/how-toconfigureibmiserieseventcollectionwithauditandesm/11328512 how-to-configure-ibm-iseries-event-collection-with-audit-and-esm-120129224935-phpapp02
This document explains how to configure and use GFI EventsManager to collect IBM iSeries (formerly AS/400) audit events through Audit, a software tool developed by Raz-Lee.]]>

This document explains how to configure and use GFI EventsManager to collect IBM iSeries (formerly AS/400) audit events through Audit, a software tool developed by Raz-Lee.]]>
Sun, 29 Jan 2012 22:49:32 GMT /slideshow/how-toconfigureibmiserieseventcollectionwithauditandesm/11328512 GFISoftware@slideshare.net(GFISoftware) How to configure IBM iSeries event collection with Audit and GFI EventsManager GFISoftware This document explains how to configure and use GFI EventsManager to collect IBM iSeries (formerly AS/400) audit events through Audit, a software tool developed by Raz-Lee. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/how-to-configure-ibm-iseries-event-collection-with-audit-and-esm-120129224935-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This document explains how to configure and use GFI EventsManager to collect IBM iSeries (formerly AS/400) audit events through Audit, a software tool developed by Raz-Lee.
How to configure IBM iSeries event collection with Audit and GFI EventsManager from GFI Software
]]>
650 3 https://cdn.slidesharecdn.com/ss_thumbnails/how-to-configure-ibm-iseries-event-collection-with-audit-and-esm-120129224935-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Email Security Solutions /slideshow/email-security-solutions/11307905 emailsecuritysolutions-120128054327-phpapp02
Through the recent acquisition of Katharionâ„¢, GFI Software is able to offer a hosted email filtering solution in conjunction with GFI MailEssentialsâ„¢ and GFI MailSecurityâ„¢.]]>

Through the recent acquisition of Katharionâ„¢, GFI Software is able to offer a hosted email filtering solution in conjunction with GFI MailEssentialsâ„¢ and GFI MailSecurityâ„¢.]]>
Sat, 28 Jan 2012 05:43:24 GMT /slideshow/email-security-solutions/11307905 GFISoftware@slideshare.net(GFISoftware) Email Security Solutions GFISoftware Through the recent acquisition of Katharionâ„¢, GFI Software is able to offer a hosted email filtering solution in conjunction with GFI MailEssentialsâ„¢ and GFI MailSecurityâ„¢. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/emailsecuritysolutions-120128054327-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Through the recent acquisition of Katharionâ„¢, GFI Software is able to offer a hosted email filtering solution in conjunction with GFI MailEssentialsâ„¢ and GFI MailSecurityâ„¢.
Email Security Solutions from GFI Software
]]>
331 4 https://cdn.slidesharecdn.com/ss_thumbnails/emailsecuritysolutions-120128054327-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Maxmp greylisting /slideshow/maxmp-greylisting/11307845 maxmpgreylisting-120128053316-phpapp01
]]>

]]>
Sat, 28 Jan 2012 05:33:14 GMT /slideshow/maxmp-greylisting/11307845 GFISoftware@slideshare.net(GFISoftware) Maxmp greylisting GFISoftware <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/maxmpgreylisting-120128053316-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Maxmp greylisting from GFI Software
]]>
299 2 https://cdn.slidesharecdn.com/ss_thumbnails/maxmpgreylisting-120128053316-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Messaging and Web Security /slideshow/bestpracticesfor2011-11307655/11307655 bestpracticesfor2011-120128051243-phpapp02
In an Osterman Research survey conducted during January 2011, decision makers and influencers demonstrated that they are decidedly pessimistic about the future of spam and malware problems for 2011.]]>

In an Osterman Research survey conducted during January 2011, decision makers and influencers demonstrated that they are decidedly pessimistic about the future of spam and malware problems for 2011.]]>
Sat, 28 Jan 2012 05:12:42 GMT /slideshow/bestpracticesfor2011-11307655/11307655 GFISoftware@slideshare.net(GFISoftware) Messaging and Web Security GFISoftware In an Osterman Research survey conducted during January 2011, decision makers and influencers demonstrated that they are decidedly pessimistic about the future of spam and malware problems for 2011. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bestpracticesfor2011-120128051243-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In an Osterman Research survey conducted during January 2011, decision makers and influencers demonstrated that they are decidedly pessimistic about the future of spam and malware problems for 2011.
Messaging and Web Security from GFI Software
]]>
543 9 https://cdn.slidesharecdn.com/ss_thumbnails/bestpracticesfor2011-120128051243-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Keep Spam Off Your Network /slideshow/block-spamfromyournetwork-11307563/11307563 block-spam-from-your-network-120128050225-phpapp02
This article defines phishing and identity theft and explains why it is important to protect your users against such attacks. ]]>

This article defines phishing and identity theft and explains why it is important to protect your users against such attacks. ]]>
Sat, 28 Jan 2012 05:02:23 GMT /slideshow/block-spamfromyournetwork-11307563/11307563 GFISoftware@slideshare.net(GFISoftware) How to Keep Spam Off Your Network GFISoftware This article defines phishing and identity theft and explains why it is important to protect your users against such attacks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/block-spam-from-your-network-120128050225-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This article defines phishing and identity theft and explains why it is important to protect your users against such attacks.
How to Keep Spam Off Your Network from GFI Software
]]>
701 2 https://cdn.slidesharecdn.com/ss_thumbnails/block-spam-from-your-network-120128050225-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Block NDR Spam /slideshow/ndrspam/11307511 ndrspam-120128045543-phpapp02
This white paper provides a technical explanation of NDR Spam and recommend solutions that can prevent or limit exposure to this kind of unsolicited email.]]>

This white paper provides a technical explanation of NDR Spam and recommend solutions that can prevent or limit exposure to this kind of unsolicited email.]]>
Sat, 28 Jan 2012 04:55:41 GMT /slideshow/ndrspam/11307511 GFISoftware@slideshare.net(GFISoftware) How to Block NDR Spam GFISoftware This white paper provides a technical explanation of NDR Spam and recommend solutions that can prevent or limit exposure to this kind of unsolicited email. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ndrspam-120128045543-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This white paper provides a technical explanation of NDR Spam and recommend solutions that can prevent or limit exposure to this kind of unsolicited email.
How to Block NDR Spam from GFI Software
]]>
1360 3 https://cdn.slidesharecdn.com/ss_thumbnails/ndrspam-120128045543-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to tell if that pop-up window is offering you a rogue anti-malware product /slideshow/fake-anti-malwarewp/11307430 fakeantimalwarewp-120128044522-phpapp02
Rogue anti-malware products are a bane for every Internet user, especially those who have little or no technical knowhow. These are hundreds of scare ware ‘products’ on the Internet. This white paper examines this type of scam, explains how they work, what to look out for and how to prevent your computer from being infected.]]>

Rogue anti-malware products are a bane for every Internet user, especially those who have little or no technical knowhow. These are hundreds of scare ware ‘products’ on the Internet. This white paper examines this type of scam, explains how they work, what to look out for and how to prevent your computer from being infected.]]>
Sat, 28 Jan 2012 04:45:20 GMT /slideshow/fake-anti-malwarewp/11307430 GFISoftware@slideshare.net(GFISoftware) How to tell if that pop-up window is offering you a rogue anti-malware product GFISoftware Rogue anti-malware products are a bane for every Internet user, especially those who have little or no technical knowhow. These are hundreds of scare ware ‘products’ on the Internet. This white paper examines this type of scam, explains how they work, what to look out for and how to prevent your computer from being infected. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fakeantimalwarewp-120128044522-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Rogue anti-malware products are a bane for every Internet user, especially those who have little or no technical knowhow. These are hundreds of scare ware ‘products’ on the Internet. This white paper examines this type of scam, explains how they work, what to look out for and how to prevent your computer from being infected.
How to tell if that pop-up window is offering you a rogue anti-malware product from GFI Software
]]>
531 2 https://cdn.slidesharecdn.com/ss_thumbnails/fakeantimalwarewp-120128044522-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-GFISoftware-48x48.jpg?cb=1523158658 GFI Software provides a single source of Web & Mail Security, Archiving, Backup & Fax, Networking & Security and Hosted solutions software for SMEs. www.gfi.com https://cdn.slidesharecdn.com/ss_thumbnails/spotlightongfiendpointsecurity2013v2-130611082135-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/spotlight-on-gfi-endpoint-security-2013/22806943 Spotlight on GFI EndPo... https://cdn.slidesharecdn.com/ss_thumbnails/networkenvironmentkeytosuccessforyourbusiness-120130044721-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/network-environment-keytosuccessforyourbusiness/11332142 Network Environments https://cdn.slidesharecdn.com/ss_thumbnails/threat-posed-by-portable-storage-devices-120130043116-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/threat-posedbyportablestoragedevices/11331926 The Threats Posed by P...