<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Andrea Martin</title>
	<atom:link href="http://www.gfi.com/blog/author/andrea-martin/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>September Webcast Line-Up</title>
		<link>http://www.gfi.com/blog/september-webcast-line-up-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=september-webcast-line-up-2</link>
		<comments>http://www.gfi.com/blog/september-webcast-line-up-2/#comments</comments>
		<pubDate>Wed, 04 Sep 2013 14:00:09 +0000</pubDate>
		<dc:creator>Andrea Martin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[Message management solutions]]></category>
		<category><![CDATA[Multi-layer IT security]]></category>
		<category><![CDATA[security solutions]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10795</guid>
		<description><![CDATA[Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs! Don’t be an easy target! Multi-layer your IT security Date: &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg"><img class="alignright  wp-image-10258" style="border: 0px solid black; margin: 10px;" alt="GFI webcasts" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg" width="144" height="135" /></a>Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!<span id="more-10795"></span></p>
<h2>Don’t be an easy target! Multi-layer your IT security</h2>
<p><b>Date: September 19, 2013 – Time: 4 p.m. BST / 5 p.m. CEST – US: 8 a.m. PDT / 11 a.m. EDT</b></p>
<p>With the growth of targeted phishing attacks, Advanced Persistent Threats and even Malware as a Service how can small and mid-sized companies keep up? With tight budgets and IT professionals stretched, to cover more with less, what level of confidence do you have in your IT security? Infiltrating a bigger company takes much more effort, but a smaller business, with vulnerable defenses can make an easier target.</p>
<p>In this webcast we will review and examine the threats facing networks today; including internal threats, malware, Internet-based and cyber-attacks. The basic methodology of each threat and how to mount effective counter measures, with a multi-layered approach to security.</p>
<p><b><a href="http://bit.ly/1909iPM">Register now</a></b></p>
<h2>Securing your IT infrastructure: Managing security solutions in a complex world</h2>
<p><b>Date: September 24, 2013 – Time: 5 p.m. BST / 6 p.m. CEST – US: 9 a.m. PDT / 12 p.m. EDT</b></p>
<p>As the types and methods of security solutions become more diverse, the challenge to manage the network security infrastructure has grown exponentially. This webcast will look at the key challenges and offer solutions to some of the most pressing issues confronting network security professionals.</p>
<p>During this webcast we will cover vulnerability assessment, threat detection and network auditing. Additionally our presenter will examine patch management, compliance, inventory assessment and effective control of BYOD (Bring Your Own Device) threats to your security and how to use these techniques to assure your data is as safe as possible.</p>
<p><b><a href="http://bit.ly/1aPtA2o">Register now</a></b></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/september-webcast-line-up-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>August Webcast Line-Up</title>
		<link>http://www.gfi.com/blog/august-webcast-line-up-3/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=august-webcast-line-up-3</link>
		<comments>http://www.gfi.com/blog/august-webcast-line-up-3/#comments</comments>
		<pubDate>Wed, 07 Aug 2013 16:13:51 +0000</pubDate>
		<dc:creator>Andrea Martin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[August webcasts]]></category>
		<category><![CDATA[GFI Webcasts]]></category>
		<category><![CDATA[IT infrastructure]]></category>
		<category><![CDATA[IT Service Providers]]></category>
		<category><![CDATA[IT solutions]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Secure your network]]></category>
		<category><![CDATA[webcast]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10763</guid>
		<description><![CDATA[Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs! IT solutions that save money and reduce financial risk Date: &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg"><img class="alignright  wp-image-10258" style="border: 0px solid black; margin: 10px;" alt="GFI webcasts" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg" width="240" height="225" /></a>Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!<span id="more-10763"></span></p>
<h2>IT solutions that save money and reduce financial risk</h2>
<p><b>Date:</b> <b>August 22, 2013 – Time: 5 p.m. BST / 6 p.m. CEST – US: 9 a.m. PDT / 12 p.m. EDT</b></p>
<p>For most businesses email is the biggest, most critical source of company information. How are you managing this constant flow of information and addressing issues such as archiving, compliance, spam and network protection?</p>
<p>In this webcast Mary Watkins, ex FT reporter, shares some real life stories about companies who have learned about financial risk the hard way. We will also take a look at how organizations can create cost savings and limit risks significantly by having the right messaging and archiving systems in place.</p>
<p><a href="http://bit.ly/18OYzYZ">Register now</a><b></b></p>
<h2>Secure your network in minutes. Don’t let the bad guys win…</h2>
<p><b>Date:</b> <b>August 27, 2013 – Time: 4 p.m. BST / 5 p.m. CEST – US: 8 a.m. PDT / 11 a.m. EDT</b></p>
<p>Security is paramount at Central Bank &amp; Trust; more so, since a virus got in and did damage. Travis Homi, IT Manager at the bank shares his experiences around keeping the network secure; the challenges he faced, the solution he put in place and what he learned along the way. Join Travis, in our live webcast, hosted by Barclay Rae, an independent ITSM consultant and put your own questions to Travis during the live Q&amp;A.</p>
<p><a href="http://bit.ly/13y2u84">Register now</a><b></b></p>
<h2>Securing your IT Infrastructure: Vigilance is the Watchword</h2>
<p><b>Date:</b> <b>August 29, 2013 – Time: 5 p.m. BST / 6 p.m. CEST – US: 9 a.m. PDT / 12 p.m. EDT</b></p>
<p>The role of an IT administrator does not end when the network is set up and the necessary security measures are in place. The ongoing health and security of the network is also dependent on the business satisfying a number of laws and regulations which the IT administrator must be aware of. Furthermore, the admin must also monitor the network continuously for faults as well as suspicious/malicious activity.</p>
<p>In this webcast we will show you how to use log data analysis and other techniques to proactively address hardware faults, malicious intrusions and other unwelcomed issues in real time. As a result, you can avoid having to react after the incident has occurred when, often, the damage has already been done.</p>
<p><a href="http://bit.ly/14Harar">Register now</a></p>
<h2>The Metrics That Matter: An Intelligent Approach for IT Service Providers</h2>
<p><b>Date: August 29, 2013 – Time: 11:00 AM US EDT</b></p>
<p>Your business data may be the most powerful tool in your toolbox and if you&#8217;re not leveraging it you&#8217;re likely missing opportunities for optimization and growth. According to a recent survey that polled hundreds of IT Service providers around the world, best-in-class ITSPs are taking a data-driven approach to decision making. Please join us for a special webinar to review the findings of the 2013 IT Service Provider Benchmarking Study and hear what your peers had to say about:</p>
<ul>
<li>Essential metrics for running a successful business</li>
<li>Identifying and measuring business efficiency, staff utilization, profitability, and client satisfaction</li>
<li>Best practices</li>
</ul>
<p>Our guest will be Leonard DiCostanzo, Senior Vice President of Community and Business Development of Autotask.</p>
<p><a href="https://www3.gotomeeting.com/register/329668614">Register now</a><b></b></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/august-webcast-line-up-3/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>July Webcast Line-Up</title>
		<link>http://www.gfi.com/blog/july-webcast-line-up-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=july-webcast-line-up-2</link>
		<comments>http://www.gfi.com/blog/july-webcast-line-up-2/#comments</comments>
		<pubDate>Wed, 10 Jul 2013 15:26:25 +0000</pubDate>
		<dc:creator>Andrea Martin</dc:creator>
				<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[TTTM]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=10644</guid>
		<description><![CDATA[Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs! Don’t get stuck in the technology trap How to take &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg"><img class="alignright  wp-image-10258" style="border: 0px solid black; margin: 10px;" alt="GFI webcasts" src="http://www.gfi.com/blog/wp-content/uploads/2013/01/GFI-webcast_evolved_JAN13.jpg" width="240" height="225" /></a>Every month we organize some exciting webcasts that cover a variety of topics – have a look at this month’s line-up and sign up for what best suits your needs!<span id="more-10644"></span></p>
<h2>Don’t get stuck in the technology trap</h2>
<p><b><i>How to take control of your technology and business strategy</i></b></p>
<p><b>Date: July 18, 2013 – Time: 8:00 a.m. PST / 11:00 a.m. EDT / 4:00 p.m. BST / 5:00 p.m. CET<br />
<a href="https://www.brighttalk.com/webcast/9843/80459">Register now</a></b></p>
<p><b>APAC Date: July 18, 2013 – Time: 10:30 a.m. IST / 1:00 p.m. CST / 3:00 p.m. AEST / 5:00 p.m. NZST<br />
<a href="https://www1.gotomeeting.com/register/739094792">Register now</a></b></p>
<p>Learn how you can take control of your technology and business strategy with cloud-based software services. In this webcast we will discuss the challenges of technology, experts, costs and upgrades that are not just time-consuming, but which impact and limit business development and strategy. We will look at the advantages of SaaS (Software as a Service) and how GFI® has solved the problem with GFI Cloud™.</p>
<h2>5 Ways to claw back lost time and improve efficiency</h2>
<p><b>Date: July 25, 2013 – Time: 9:00 a.m. PST / 12:00 p.m. EDT / 5:00 p.m. BST / 6:00 p.m. CET<br />
<a href="https://www.brighttalk.com/webcast/9845/80753">Register now</a> </b></p>
<p><b>APAC Date: July 31, 2013 – Time: 9:30 a.m. IST / 12:00 p.m. CST / 2:00 p.m. AEST / 4:00 p.m. NZST<br />
<a href="https://www1.gotomeeting.com/register/135111232">Register now</a></b></p>
<p>In this webcast we will look at five common areas where a company potentially claws back valuable time and resources so that that they can focus on the important business of making money.  With just a few simple IT focused solutions that help to automate manual processes and improve efficiency, managers and employees are able to get more out of their working day.</p>
<h2>Securing your IT Infrastructure: It’s a Jungle Out There</h2>
<p><b>Date: July 30, 2013 – Time: 9:00 a.m. PST / 12:00 p.m. EDT / 5:00 p.m. BST / 6:00 p.m. CET<br />
<a href="https://www.brighttalk.com/webcast/9827/80749">Register now</a></b></p>
<p><b>APAC Date: August 2, 2013 – Time: 9:30 a.m. IST / 12:00 p.m. CST / 2:00 p.m. AEST / 4:00 p.m. NZST<br />
<a href="https://www1.gotomeeting.com/register/389999369">Register now</a></b></p>
<p>The data on computer systems are an enterprise’s single most valuable resource. Data loss can be very costly, particularly for organizations in the small and mid-sized business market where the difference between survival and closure can be razor thin.  A network without proper security is an invitation to economic ruination, public humiliation, customer loss of trust and in some cases legal action.</p>
<p>In this webcast we will review and examine the threats facing networks today; including internal threats, malware, Internet-based and cyber-attacks. The basic methodology of each threat, and how to mount effective counter measures, will be examined and reviewed.</p>
<p><strong><em>Seats fill up fast, so be sure to register today!</em></strong></p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/july-webcast-line-up-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-14 20:47:59 by W3 Total Cache --