Mon - Fri 9:00 AM – 5:00 PMClosed on weekends
Licensing GFI FaxMaker As Fast As Possible

Licensing GFI FaxMaker As Fast As Possible

GFI FaxMaker 2015 is leading fax server solution. FaxMaker is available as a total on-premise application, or hybrid application with hosted hardware. Easy to deploy, and fast on return on investment, GFI FaxMaker saves time and money.

GFI FaxMaker 2015 licensing can appear to be a bit difficult to understand so I hope I can make it as simple as possible to understand. GFI FaxMaker 2015 is licensed by the number of users, the number of fax channels (fax lines) , and options such as the OCR module and or virtual fax hardware such as the SR140. Licenses are also available for additional servers as well.

Posted by

FrugalBrothers Now Offering GFI Software Installation and Configuration Services

FrugalBrothers is pleased to announce it will now offer installation and configuration of GFI Software products in North America. We have recently added network support engineers and now offer the ability to install and configure top GFI network security products. We now offer both remote and on-premise installation and configuration of all GFI network security and email…

Posted by

10 BYOD policy guidelines for a secure work environment

Bring your own device (BYOD) is no longer simply a buzzword BYOD-300x256or a new trend; it’s reality. And in that reality, almost half of all employees use their own devices to access corporate assets such as network drives, documents, printers, web proxies, social media sites, and personal cloud services. Malware, viruses, theft, unsecured devices, jailbroken devices, and a lack of control put corporate data, intellectual property, and client information at risk. The answer to this problem is to create, to manage, and to enforce BYOD policy guidelines to secure your work environment.

Posted by

A tale of two security approaches – and why you need both

Once upon a time, attacks on computers and networks were relatively simple. Our primary worry was viruses and their variants – worms, Trojans, rootkits. Their authors set out with malicious intent, to create software that can cause harm by shutting down a system or an entire network, destroying data and/or programs, or collect information and send it back to the attackers.

Posted by

Beyond storage: Why email archiving can save the day

David Kelleheron April 10, 2014

How many email messages do you send each day? How many Email-is-not-dead-298x300do you receive? Like many regular users, you probably send over 30 messages per day and receive over 100. If you are a power user, you can probably double those numbers and still come up short. With so much mail flowing through your inbox, it is far too easy to find your inbox full, to suffer from information overload, or even to get a little delete-happy and drop messages that you may need later on. Whether you are limited by the size of your mailbox, or the storage on your solid-state drive, there is a very good chance at some point you or your employees are going to find the need for an email message that was deleted.

Posted by

Target’s tale: Lesson learned or will you be burned?

Written by: March Thaler

Turn back the clock to late last year. At the height of theshutterstock_125177096-300x255 holiday season, between November 27 and December 15, hackers certainly gave new meaning to the term “hit the bull’s-eye!”

Cybercriminals toyed with retail giant Target, known for the circular red and white logo that symbolizes its name. Information from 40 million guest debit and credit card accounts was stolen – or so it was thought. The initial estimate, already among the largest in U.S. corporate history, turned out to be a fraction of the total. Today, it ranges from 70 million to 110 million, depending on reports.

Posted by

Patching and antivirus tips every sys admin should know

Jenny Duncan on March 19, 2014

When you started out in IT, did you really want to spend allshutterstock_126121670-300x300 your life applying patches to PCs and checking if the antivirus product installed is up to date and working properly? Let’s be honest, these tasks get a little repetitive and monotonous, but if you drop the ball with either of these jobs, your IT department (and you) could end up in hot water. Taking shortcuts on patching and antivirus should never be an option.

Posted by

GFI EventsManager Licensing Explained

This article explains the two different versions of GFI EventsManager, and how it is licensed. Unfortunately GFI doesn’t break them down on its website, and thus creates some confusion to potential customers.

EventsManager Complete:

Formerly GFI EventsManager for Servers, GFI recently added an active monitoring component to the software. This is similar to GFI Network Monitor and adds the ability to monitor services, CPU utilization, hard drive space and more. This version also allows to you to manage event logs from Windows Servers, W3C logs and Sys logs from network devices such as Cisco routers and switchers. You are not able to manage logs from computers running Microsoft Windows (workstations) this product is licensed per node.

Posted by