Tag Archives: FrugalBrothers

Licensing GFI FaxMaker As Fast As Possible

GFI FaxMaker 2015 is leading fax server solution. FaxMaker is available as a total on-premise application, or hybrid application with hosted hardware. Easy to deploy, and fast on return on investment, GFI FaxMaker saves time and money.

GFI FaxMaker 2015 licensing can appear to be a bit difficult to understand so I hope I can make it as simple as possible to understand. GFI FaxMaker 2015 is licensed by the number of users, the number of fax channels (fax lines) , and options such as the OCR module and or virtual fax hardware such as the SR140. Licenses are also available for additional servers as well.
Continue reading

FrugalBrothers GFI FaxMaker Case Study

This is the video and text from my recent GFI FaxMaker case study. In this video, I share a bit about my background, and my experience with GFI FaxMaker 2015.

I was a chief information officer for a mortgage company in Indianapolis we were looking to build a fax server and doing my research I came across GFI. The product was GFI FaxMaker and that’s where I began my relationship with GFI.

The primary value of FaxMaker is the ability to bridge older technologies such as stand-alone fax machines with newer technologies such as email, That’s really where that value comes from. As far as the easy use for the product as well. One of the cool things about FaxMaker is it works with really any email server as for SMTP, so it doesn’t really require any type of special integration work it works with all of them just fine.

Compliance is really huge. A lot of organisations have to comply with what’s called PCI DSS, for credit card security and HIPAA for medical records and there are certain documents you cannot send securely unless you send it with fax. Faxing also allows you to get an accurate record of when the document was sent and received. When personal faxes, email and file-sharing have reduced that a lot but organizations still really require faxing, especially manufacturing the medical industry, legal finance etc… There are certain documents that have to be sent and received securely.

The flexibility of FaxMaker allows it to be virtualized for example, it allows us to work with the old analog phone lines, digital circuits, hosted communications as well. Those technical benefits alone make FaxMaker a winner for just about any type of installation. The whole dynamics of the software, the flexibility of FaxMaker, the ability to scale it from a smallest install to multi-site operations. The ability to offer FaxMaker both hosted, on-premise and a hybrid solution as well. If there’s really anybody that needs a fax solution I can help.

With the economic benefit of FaxMaker is that it saves companies time because people aren’t having to run back and forth to fax machines. It saves them on things like fax machines and consumables, toner and paper. It saves them on having all these fax machines sitting around the office and the ability to print and fax from your desktop saves a lot of employees time.

FrugalBrothers Now Offering GFI Software Installation and Configuration Services

FrugalBrothers is pleased to announce it will now offer installation and configuration of GFI Software products in North America. We have recently added network support engineers and now offer the ability to install and configure top GFI network security products. We now offer both remote and on-premise installation and configuration of all GFI network security and email protection tools. FrugalBrothers has been a GFI partner since 2006 and has been a Gold Level partner for the last 8 years. Having recently added network security engineers to our staff, FrugalBrothers is now poised to become full service IT Security Firm. For more information please contact Bruce Naylor at (260) 724-2748 or email bruce.naylor@frugalbrothers.com

Safeguarding your emails and files with GFI MailArchiver 2014

Safeguarding email is a must in today’s litigious society J003-Content-MailArchiver2014-300x300and archiving is the only way a company can do so effectively and securely. A new survey by GFI Software shows that more than half of respondents reported using their inbox as a document storage device and that external cloud-based storage alternatives are also posing a risk.

A new version of GFI MailArchiver is available today and we asked its product manager, Ian Bugeja, to tell us how GFI’s award-winning solution can help companies combat this problem.

Q: What’s the big news with GFI MailArchiver 2014?

Files. File archiving to be more precise. In earlier versions we had introduced a feature whereby users could manually archive files. Our customers loved this function and the recent increase in cloud-based storage services has only highlighted the importance of file archiving within the organization. That is what we have set out to address with the latest version of GFI MailArchiver. Road warriors are constantly using and saving files wherever it is convenient for them and the company often has no clue where these files are stored. We introduced new features that eliminate the need for employees to use public cloud-based services for document storage and this is done automatically for them.
Continue reading

12 email tips to share with your users

Unsolicited email or spam may be a mere nuisance for most anti-spam-300x300emails users, but for an IT administrator spam is a headache and a major security threat. More than 3% of all spam includes a malware payload, but that doesn’t mean that the remainder is safe. Far from it. You can still be directed to a website that is infected by clicking on a link in that email.
Continue reading

How to Improve Your Company’s Cyber Security with GFI LanGuard

Recently, a small bank in Wyoming with a 1 man IT department contracted a nasty computer virus that their antivirus did not catch. The virus caused a huge loss in production and new business.

Because their Big Name antivirus failed to detect the virus, the bank began looking for an alternative. How did this happen? Because today computer crackers (The Bad Guys) are exploiting third party applications such as Java, or Adobe Flash. Also there may be machines on the network with outdated antivirus definitions.

Continue reading

The top 23 free data recovery tools

Your fault, my fault, nobody’s fault… it doesn’t matter. When a file you need is gone, all you really want to do is get it back: as quickly and as painlessly as possible. Deleted by accident? Formatted by mistake? Drive corrupted by the latest attempt at quadruple-booting? Plugged in the power to a non-hot swappable drive? Dragged a DVD across the gravel parking lot? Ran the USB key through the wash? We’ve heard, seen, and even done most of them, and along the way we have found a number of great tools to bring our data back from the dead.
Continue reading

GFI Cloud Explained as Fast as Possible

Over the last several years GFI has been moving some of the functionality of their most popular products to the cloud. As of today there are currently 6 different subscription based services that can be purchased individually or together. The benefit to our customers include lower costs to purchase, no expensive hardware such as servers to purchase, and ease of deployment.
Continue reading

10 BYOD policy guidelines for a secure work environment

Bring your own device (BYOD) is no longer simply a buzzword BYOD-300x256or a new trend; it’s reality. And in that reality, almost half of all employees use their own devices to access corporate assets such as network drives, documents, printers, web proxies, social media sites, and personal cloud services. Malware, viruses, theft, unsecured devices, jailbroken devices, and a lack of control put corporate data, intellectual property, and client information at risk. The answer to this problem is to create, to manage, and to enforce BYOD policy guidelines to secure your work environment.
Continue reading

A tale of two security approaches – and why you need both

Once upon a time, attacks on computers and networks were relatively simple. Our primary worry was viruses and their variants – worms, Trojans, rootkits. Their authors set out with malicious intent, to create software that can cause harm by shutting down a system or an entire network, destroying data and/or programs, or collect information and send it back to the attackers.
Continue reading