Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

SharePoint® Log Management Added to GFI EventsManager™ 2011

on April 27, 2011

GFI EventsManager with LOGbinder SP offers new log monitoring, alerting, reporting and archiving capabilities for SharePoint® users   Enhanced security and compliance features have been added to GFI EventsManager™ 2011, including Microsoft® SharePoint® log management, and auto-update patch management capabilities.

0

Email archiving as an alternative to PST backup

on April 26, 2011

Microsoft does not want you to backup PST files Email is the internet’s original killer app and if your work depends on email then you are most likely using Microsoft Outlook as your email client. Your emails, tasks, calendar items …

4

How to Detect Network Intruders (Part 2)

on April 21, 2011

In the previous blog post we saw how identity theft in a corporate environment can be a huge risk for a corporate environment and how the possible injection of malicious code can easily take place and go unnoticed on a client …

4

Isn’t it Blue-tiful?

on April 20, 2011

Blue cupcakes? Blue donuts? Blue posters? What’s happening? Why’s the GFI world turning blue???

0

Free White Paper – Stopping Malware: Beyond Signatures

on April 18, 2011

Have you thought about integrating antivirus in your current product? Are you looking to trade in your old AV solution for a faster more lightweight solution? Bottom line – do you want to provide a better malware protection solution for …

0

GFI holds Partner Conference for Czech and Slovak Partners

on April 18, 2011

The annual partner event was held on Tuesday, April 12, with almost 200 Czech and Slovak partners attending. Also present for the event were GFI members, namely Simon Azzopardi (VP, APAC Sales), Paul Eldridge (Director of Channel Marketing EMEA & …

0

How to Detect Network Intruders (Part 1)

on April 18, 2011

Stealing someone’s identify is one of the best known techniques for hackers to access confidential information in a corporate environment. But how does it work? Why is it difficult to detect such intrusion attempts? What can be done to safeguard your …

6

Is Spam a form of Marketing/Advertising?

on April 15, 2011

Arguably, spam forms part of the email marketing tool used by marketers for direct advertising.  We never asked for or subscribed to most marketing messages that we receive on a daily basis. So how is spam different? Let’s first take …

5

GFI Software Collaborates with Intel for Cloud Computing among SMEs

on April 14, 2011

The following GFI Software solutions, GFI VIPRE® Antivirus, GFI LANguard™, GFI EventsManager™ and GFI EndPointSecurity™, are now available for resale by VARs and MSPs through the Intel® Hybrid Cloud. SMBs are increasingly aware of the cost savings and efficiencies they …

0

How to repair PST files

on April 13, 2011

One of the biggest problems users encounter when using PSTs is that they can corrupt. Because there are countless messages within a PST that could easily be lost when the file becomes corrupt, knowing how to repair PST files is …

2