Close the door on
patch vulnerabilities

White papers - GFI LanGuard

Five steps to improve your network’s health

This white paper provides your business with recommended steps to build a methodical network auditing and patching process. Diligently adhering to this simple five-step plan can dramatically improve your network security and enhance protection against new malware.

BYOD policy roadmap

Bring your own device (BYOD) is both an IT blessing and a curse. It’s great for users to be productive and at the same time be connected to personal contacts, apps and tools. But unfortunately BYOD can bring a wealth of IT problems – big problems. Download our whitepaper for our 16 rules of BYOD engagement that will guide you in the right direction and provide a positive experience for all.

10 ways to protect your network from BYOD vulnerabilities

The adoption of Bring Your Own Device (BYOD) in businesses is rapidly growing. IT admins, now have a tougher job to protect tablets and smartphones that they didn’t even specify, procure or configure. Check out our whitepaper for our top 10 tips on how to protect your network from these new vulnerabilities.

Vulnerability management

Managing a growing PC landscape isn't easy. Monitoring a couple of PCs can be straightforward, and a diligent IT manager will keep those machines protected. But what happens when watching more machines is required?

Patch management

Managing and administering software updates. It remains challenging and resource-intensive for IT departments. This white paper examines the role of patch management, which keeps user devices up-to-date without compromising reliability, productivity, security and data integrity.

PCI DSS compliance

This white paper provides GFI's understanding of payment card industry data security standard (PCI DSS) requirements. It also explains how GFI LanGuard, GFI EventsManager®, and GFI EndPointSecurity™ can assist you in achieving PCI compliance.

Patching for businesses – from manual to automated

No single piece of software is flawless. Somewhere in that codebase are errors that slip through the Q&A net. Unfortunately, these errors can be exploited by hackers and cybercriminals. Read this whitepaper to learn how address this growing concern.