SMB Zone

GFI FaxMaker – Q&A with Product Manager Joe Kern

GFI FaxMaker has been a leader in the faxing industry for more than 20 years, and this release marks the start of a series of long-awaited features and functionality.

Continue reading

Malware is out there and it’s up to no good

With every passing day, new exploits are found and hackers get cleverer. It’s time to turn the tables and start seeing your network the same way the bad guys do

Continue reading

It’s award season and GFI is collecting

In the past few days we received some awesome news about our products being recognized by independent testers and publications.

Continue reading

Data breach debate – how responsible are employees really?

Data breaches have very quickly climbed the infosec agenda. Here at the GFI Blog we also covered both the data breach threat posed by employees, and unearthed the murky area of IT malfeasance.

Continue reading

WebInsights – A new age of web-activity monitoring

On March 26, GFI released a new version of GFI WebMonitor. What is interesting about this release is that it comes equipped with a new feature – WebInsights

Continue reading

What’s new in the latest major WebMonitor update?

A new release for GFI WebMonitor is available today so we caught up with Calin Ghibu, product manager, to learn more about the release and what makes this update truly special.

Continue reading

Social Navigation: City of Boston partners with Waze

The idea of posting information in a social venue while driving would seem, on the face of it, to carry a lot of risk – but is Waze actually making the streets safer? The City of Boston seems to think so.

Continue reading

SMS for business gets the message across [Infographic]

According to statistics in a recent report by SAP, 74 percent of adults use SMS on a regular basis, and 64 percent said they believe businesses should make more use of SMS to interact with their customers.

Continue reading

Whose airwaves are they, anyway?

How do you balance private property rights with the right to use those public airwaves no matter where you are?

Continue reading

Insider threats are alive and very (un)well

What should a company do when users, whose roles require access to sensitive data, misuse that access? What precautions can companies take to reduce both the risk of this happening, and the damage that can result from insider activity?

Continue reading

Find us on Facebook

Follow us on Twitter